Friday, September 18, 2020

Security

Zoom end to end encryption free users

Zoom Takes U-Turn, Enables E2E Encryption For Free Users But…

Zoom has finally agreed to provide free end-to-end encryption calls for all users. This announcement comes weeks after the video chat service said that...
Intel CET Anti malware

Intel To Add Anti-Malware Hardware In Its Tiger Lake CPUs

Intel announced today that it will include its Control-Flow Enforcement Technology (CET) hardware-based protection to combat common malware, in its upcoming Tiger Lake mobile...
Digilocker otp bypass

Hackers Could Access 38 Million Indian DigiLocker Accounts Without Password

The Indian Government has acknowledged that the secure document wallet service 'Digilocker' could have allowed hackers to bypass mobile OTP and sign in as...
Trump Biden election campaign hacking

Foreign Hackers Tried Hacking Trump, Biden’s Election Campaign

Hackers are trying their best to meddle with the upcoming US elections. According to a report by Google's Threat Analysis Group (TAG), foreign hackers...
Sign In with apple flaw

Indian Developer Grabs $100,000 For Reporting ‘Sign in with Apple’ Flaw

Sign in with Apple is similar to other app login options such as "Sign in with Google" or Facebook; however, the difference is that...

GitHub Warns Developers About Malware- Spreading Java Projects

On Thursday, GitHub issued a warning about a new malware that's spreading through open-source NetBeans projects. The malware dubbed "Octopus Scanner" by security researchers...
Strandhogg 2.0 Android bug

Strandhogg 2.0: A “Nearly Undetectable” Android Bug That Tricks Users

Security researchers have found a vulnerability in Android devices that could allow hackers to steal data from users by tricking them into typing passwords...
Trump confidential data

Hackers: Pay $42 Million Or We’ll Release Trump’s “Dirty Laundry”

The REvil ransomware group that targeted A-grade celebrities last week is now demanding a ransom of $42 million from President Donald Trump otherwise, they'll...
Most exploited vulnerabilities

These Are The Top 10 Most Exploited Vulnerabilities In Past 3 years

Cybersecurity is a matter of grave concern, and bad actors are actively involved in exploiting vulnerabilities in systems. Today, the US cybersecurity agencies have...
Intel Thunderspy attack

Any PC Manufactured Before 2019 Is Vulnerable To ‘Thunderspy’ Attack

Björn Ruytenberg, a security researcher from Eindhoven University of Technology, has revealed that all the PCs manufactured before 2019 could be hacked, thanks to...